StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Acquiring an Image from Linux OS - Case Study Example

Cite this document
Summary
The study "Acquiring an Image from Linux OS" focuses on the critical analysis of the major issues in acquiring an image from a Linux Operational System. A lot of research has been undertaken in the field of computer forensics to protect data stored in a computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Acquiring an Image from Linux OS
Read Text Preview

Extract of sample "Acquiring an Image from Linux OS"

Different methods have been developed to cater to the different operating systems and large file sizes including Smartsector for windows and Linux dd for the Linux operating system which can operate in both files by-file and sector-by-sector modes of imaging hence increasing the speed of fragmentation. These new technologies are also able to image from more than a single storage device including hard drives, removable media devices, and tapes.

To acquire an image disk from a Linux operating system, various methods of acquiring images have been developed including Safeback version 2.0 technique which can acquire images on various operating systems on the IDE drives of computers using the sector-by-sector method; the snapback DataArrest technique which acquires images on SCSI drives of computers using the sector by sector method and DIBS RAID technique which performs optical acquisition of images on both the SCSI drive and the IDE drive of the computer using both the sector by sector and the file by file methods. These methods hold a major strength in the fact that they can handle large amounts of data, unlike traditional methods.

However, the most appropriate tool to use is the Linux dd version 7.0. This tool acquires images from the hard drive of the computer. External storage devices such as removable disks, tapes, flash drives, and compact disks can also be used with this tool to perform imaging in a Linux environment. Linux dd version 7.0 can perform image verification by the AMD5 checksum verification method [2]. This tool shows high levels of strength in computing complexity and it is very good in detection modification. The probability of program collision is very low. Imaging is then done on the SCSI drive of the computer unlike other methods of imaging that perform imaging in the IDE drive. Copying of data into the hard drive is normally done using both modes of imaging which are sector by sector and file by file. This tool can eliminate any form of a slowdown in imaging and it is not affected by fragmentation of the files in the hard drive of the computer [2]. However, acquiring an image using this tool can be affected by the corruption of data and possible failure of the system.

Imaging is a very crucial process in computer forensics to ensure that the data stored in computers is secured. While performing this process, it is important to choose the right type of tool and methodology to avoid problems that result from poor imaging. The field of computer forensics is growing each day and new technologies are emerging thus improving the efficiency of the process of imaging. It is also important to be considerate of the type of operating system while acquiring images from different platforms. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case project Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Case project Study Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1684262-case-project
(Case Project Study Example | Topics and Well Written Essays - 250 Words)
Case Project Study Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1684262-case-project.
“Case Project Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1684262-case-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Acquiring an Image from Linux OS

Apple Inc.: Market Analysis & Competition

Competitive Analysis Major competitors of iDesk will be Microsoft Surface, Panasonic with their touch screen table, linux with their MPX multi-touch support, Pioner with WWS-DT 101, MultiTouch, Ideum's MT2 and Sony actrac Table.... linux Competition on the Microsoft Surface Front?... om/2007/07/16/linux-competition-on-the-microsoft-surface-front/ Andersen, S.... Apart from this, the industry's competitiveness will also be gauged according to Porter's Five Forces Model for competition....
2 Pages (500 words) Research Paper

Sociology in MMORPGs

ome people get addicted to Massive Multi Online Role Playing Games due to the self-esteem boost they get from being part of a group.... Another part to this is a person with a low self-image.... A person with a low self-image can go onto these games and, no matter what, have a character that looks amazing....
7 Pages (1750 words) Essay

Marketing - Microsoft Case Study

The industrial revolution brought a lot advances for the business world which was then followed by the information age.... The information age change the way businesses around the globe was realized and with it came the.... ... ... The 1990's technology has accelerated as society move into the Internet Age which transformed the way people communicated....
12 Pages (3000 words) Essay

Microsoft Marketing Strategy

The operating system Windows is presently capturing more than 90% of the global market share by beating Mac of Apple and linux.... The quantitative approach will involve the use of journals, magazines, and online stuff from different websites.... The marketing plan will further elaborate few key issues, like will Windows 7 be able to conquer the market share from existing operating systems like XP, Vista, and Mac?... What will be the strategic issues that may arise from the application of technology by other competitors?...
21 Pages (5250 words) Research Paper

Computer Forensic Software

The computer infrastructure is one of the most important parts of modern organizations ranging from small, medium to large.... These include the FTK imager, which can be defined as a disk imaging program that saves a hard drive's image in a single file so that it can be analyzed later using FTK, the Registry Viewer Toolkit and the Password Recovery Toolkit [5].... Other important subjects to be covered include how a forensic image is created as well as previewing and organizing available evidence by the creation of a case in AccessData's FTK, which is compulsory....
15 Pages (3750 words) Coursework

Digital Forensic

Other editors, for example, help the user to derive meaning from the file examined, extract Unicode and ASCII contents, recognizing common structures, and even searching the patterns.... He then extracts the segments of the suspicious code from the file and then checks the codes....
20 Pages (5000 words) Coursework

A Methodology for the Development of a Visual Programming Language

The tasks can be used on various platforms like Microsoft Windows and different types of UNIX, Linux and MAC os X.... Hardware such as multi-threading and multi-processing, which works with a built-in scheduler that utilizes, multiplexes principle on the os threads to give commands that are then executed.... LabView can be used on different platforms that may include Windows, linux, and also linux.... ifferent LabView packages provide different options for a large number of functions for analyzing data, statistics, acquiring data, generating signals, conditioning of signals, and mathematics....
5 Pages (1250 words) Term Paper

Linux Booting Process

In a Personal Computer, for instance, the location os the BIOS which stores the flash memory (in the computer mainboard or motherboard), the CPU initiates reset vector which starts a program in flash/ROM.... The paper "linux Booting Process " is an excellent example of an essay on information technology.... In a nutshell, the linux booting process starts from the BIOS where the MBR is executed after the integrity check is performed before the MBR loader is executed....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us